First published: Tue Jun 27 2023(Updated: )
Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12, a malicious client is able to construct credentials with permanent validity in some specific scenarios. This is caused by the some rare scenarios in which HMAC payload can be always valid in OAuth2 filter's check. Versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12 have a fix for this issue. As a workaround, avoid wildcards/prefix domain wildcards in the host's domain configuration.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Envoyproxy Envoy | >=1.23.0<1.23.12 | |
Envoyproxy Envoy | >=1.24.0<1.24.10 | |
Envoyproxy Envoy | >=1.25.0<1.25.9 | |
Envoyproxy Envoy | >=1.26.0<1.26.4 | |
redhat/envoy | <1.26.3 | 1.26.3 |
redhat/envoy | <1.25.8 | 1.25.8 |
redhat/envoy | <1.24.9 | 1.24.9 |
redhat/envoy | <1.23.11 | 1.23.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-35941 is a vulnerability in the Envoy proxy that allows a malicious client to construct credentials with permanent validity in specific scenarios.
CVE-2023-35941 has a severity rating of 9.8 (Critical).
CVE-2023-35941 affects Envoy versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12.
To fix CVE-2023-35941, you should update Envoy to version 1.27.0, 1.26.4, 1.25.9, 1.24.10, or 1.23.12.
You can find more information about CVE-2023-35941 on the Envoy GitHub security advisory page and the Red Hat advisory page.